CYBER DEFENSE FRAMEWORK
BROOKE MILLER
BRIAN CEDILLO
CRISTAL HERMOSILLO
ELIJAH MILTON
FRANK PAGALOS
DANIEL LOZEN-KOWALSKI
OBJECTIVE: CRITICAL SECURITY CONTROLS
• Research top 20 SANS CSC and sub-controls to document and determine
the following:
• Document sub-controls with no validation
• Document sub-controls with tools/validation and which tool(s) are required
• Document sub-controls with manual testing validations required
• Map out the cyber defense controls to the sans 20 controls and sub-
controls
• Evaluate All sans sub-controls which were not currently listed on the cdc
framework to determine which should be added
• Document which tools are used for each sub-control which is added
SANS CIS CRITICAL SECURITY CONTROLS
MAPPING TO CYBER DEFENSE CONTROLS
Existing Cyber Defense Controls
(13)
SANS Controls (20)
SANS CIS CRITICAL SECURITY CONTROLS
MAPPING TO CYBER DEFENSE CONTROLS
OBJECTIVE: VISUALIZATION
• Review ECIF/CKS Analysis and recommend improvements to better
visualize the data.
• Review current / proposed visualizations and suggest 3 new
innovative visualization approaches and tools to improve basic
visualizations.
• We like:
• Pie Chart
• Bar Graph
• Horizontal Bar graph
• Need to improve:
• Bubble graph
• Issues:
• Bubbles blob together,
which doesn’t allow size to
be prominent
• Hue is hard to differentiate
• Scale is hard to read & use
• Change to:
• Multi-level doughnut graph
• Tiers are easier to understand
• Easier to differentiate colors &
size
ECIF/CKS ANALYSIS
LINUX PACKAGE ANALYSIS
• Change this to a doughnut
graph
• We found that it would be
easier to read. Similar to the
ECIF/CKS Analysis.
VULNERABILITY COUNT BY AREA
• Recommendation:
• Changing the order to
ascending order instead of
alphabetical.
Cyber_Defense_Presentation
RECOMMENDED GRAPHS
RECOMMENDATIONS CONT.
Do’s & Don’ts
• Remove excess grid lines
• Contrast
• Readable labels
• Avoid repetition
• Avoid Smoothing and 3-D
• Gradients
• Sorting
• Color
Things to bring variety
• Orientation
• Curve
• Length
• Width
• Shape
• Enclosed
• Intensity
• Special
• Motion
OBJECTIVE: OUTPUT
• Sourcefire automation was to reduce the amount of work it
takes to extract the list of Sourcefire rule ID’s applied to each
Policy in Defense center.
SOURCEFIRE AUTOMATION
• Task: Getting rule IDs applied to each policy in Defense
Center
• Method: Researched Sourcefire API
• Results: We are currently unable to automate some of the
correlations we want to. Now, Cisco will now be
implementing some of our feature requests in SourceFire
6.2.
OBJECTIVE: OUTPUT CONT.
• Create a template for a final report of Cyber Defense
Framework (results of the deliverables…graphs, pics, etc.),
mimic A&P reports, export Tableau visualizations into template
PROCESS FLOW TEMPLATE
A Template containing the various
steps involved in the CDC
Framework based on a
combination of both sample
process flows and A&P reporting
to create an organized streamlined
view of CDC process flows.
15
OVERALL EXPERIENCE
RECOMMENDATION/IMPROVEME
NT
• More organization on
objectives and deliverables
(defined scope)
• More specific objectives
• Regular communication
(weekly)
TAKEAWAYS
• Visualization
• Group dynamic
• Communication/networking
• Insight into the CDC
THANK YOU

More Related Content

PDF
SplunkLive! Customer Presentation - Hurricane Labs
PDF
Building an event system on top MongoDB
PPTX
Dashboards, widgets, business views & 3D-data centre
PDF
Top-Down Approach to Monitoring
PDF
DBOps
PDF
Microsoft Cyber Defense Operation Center Strategy
PDF
Operationalizing Red Teaming for Fun and Profit
PPTX
Red team Engagement
SplunkLive! Customer Presentation - Hurricane Labs
Building an event system on top MongoDB
Dashboards, widgets, business views & 3D-data centre
Top-Down Approach to Monitoring
DBOps
Microsoft Cyber Defense Operation Center Strategy
Operationalizing Red Teaming for Fun and Profit
Red team Engagement

Viewers also liked (14)

PPTX
AWS Security Ideas - re:Invent 2016
PDF
SANS 2013 Critical Security Controls Survey
PPTX
Solving the CIO’s Cybersecurity Dilemma
PPTX
Recent changes to the 20 critical controls
PDF
Sitnl 2012 erp security
PDF
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
PDF
SAP HANA Cloud Security
PDF
7 Strategies for Reducing IoT Cyber Risk
ODP
Critical Controls Might Have Prevented the Target Breach
PPTX
An introduction to SOC (Security Operation Center)
PDF
SAP HANA Cloud Platform - Overview
PDF
The 5 elements of IoT security
PPTX
Security Operation Center - Design & Build
PDF
7 cyber security questions for boards
AWS Security Ideas - re:Invent 2016
SANS 2013 Critical Security Controls Survey
Solving the CIO’s Cybersecurity Dilemma
Recent changes to the 20 critical controls
Sitnl 2012 erp security
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
SAP HANA Cloud Security
7 Strategies for Reducing IoT Cyber Risk
Critical Controls Might Have Prevented the Target Breach
An introduction to SOC (Security Operation Center)
SAP HANA Cloud Platform - Overview
The 5 elements of IoT security
Security Operation Center - Design & Build
7 cyber security questions for boards
Ad

Similar to Cyber_Defense_Presentation (20)

PPT
NDepend Public PPT (2008)
PPTX
EMBEDDED AND REAL TIME SYSTEMS-Unit-4_6703.pptx
PPT
Structured Logic Design With Very Higspeed Integrated Circuit Hardware Descri...
PDF
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
PDF
1961 no rainclouds here! using cics platform and policies to keep your privat...
PPTX
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
PDF
apidays Paris 2024 - API Governance for EDA, Frank Kilcommins, SmartBear
PPTX
2844 CICS Policy Based Management – There’s a new sheriff in town
PPTX
2844 inter connect cics policy (2844)
PPTX
Application visibility across the security estate the value and the vision ...
PDF
Cloud-native Data
PDF
Cloud-Native-Data with Cornelia Davis
PPTX
network engi بحث جميل للفائده القصوى ليت
PPTX
Share cics policy (2844)
PPTX
Cisco Application Centric Infrastructure
PDF
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
PPT
Share 2014 Pittsburgh CICS Technical Overview
PPTX
Static Analysis Primer
PDF
170215 msa intro
PDF
Spring Cloud and Netflix OSS overview v1
NDepend Public PPT (2008)
EMBEDDED AND REAL TIME SYSTEMS-Unit-4_6703.pptx
Structured Logic Design With Very Higspeed Integrated Circuit Hardware Descri...
Cisco Live Announcements: New ThousandEyes Release Highlights - July 2024
1961 no rainclouds here! using cics platform and policies to keep your privat...
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
apidays Paris 2024 - API Governance for EDA, Frank Kilcommins, SmartBear
2844 CICS Policy Based Management – There’s a new sheriff in town
2844 inter connect cics policy (2844)
Application visibility across the security estate the value and the vision ...
Cloud-native Data
Cloud-Native-Data with Cornelia Davis
network engi بحث جميل للفائده القصوى ليت
Share cics policy (2844)
Cisco Application Centric Infrastructure
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
Share 2014 Pittsburgh CICS Technical Overview
Static Analysis Primer
170215 msa intro
Spring Cloud and Netflix OSS overview v1
Ad

Cyber_Defense_Presentation

  • 1. CYBER DEFENSE FRAMEWORK BROOKE MILLER BRIAN CEDILLO CRISTAL HERMOSILLO ELIJAH MILTON FRANK PAGALOS DANIEL LOZEN-KOWALSKI
  • 2. OBJECTIVE: CRITICAL SECURITY CONTROLS • Research top 20 SANS CSC and sub-controls to document and determine the following: • Document sub-controls with no validation • Document sub-controls with tools/validation and which tool(s) are required • Document sub-controls with manual testing validations required • Map out the cyber defense controls to the sans 20 controls and sub- controls • Evaluate All sans sub-controls which were not currently listed on the cdc framework to determine which should be added • Document which tools are used for each sub-control which is added
  • 3. SANS CIS CRITICAL SECURITY CONTROLS MAPPING TO CYBER DEFENSE CONTROLS Existing Cyber Defense Controls (13) SANS Controls (20)
  • 4. SANS CIS CRITICAL SECURITY CONTROLS MAPPING TO CYBER DEFENSE CONTROLS
  • 5. OBJECTIVE: VISUALIZATION • Review ECIF/CKS Analysis and recommend improvements to better visualize the data. • Review current / proposed visualizations and suggest 3 new innovative visualization approaches and tools to improve basic visualizations.
  • 6. • We like: • Pie Chart • Bar Graph • Horizontal Bar graph • Need to improve: • Bubble graph • Issues: • Bubbles blob together, which doesn’t allow size to be prominent • Hue is hard to differentiate • Scale is hard to read & use • Change to: • Multi-level doughnut graph • Tiers are easier to understand • Easier to differentiate colors & size ECIF/CKS ANALYSIS
  • 7. LINUX PACKAGE ANALYSIS • Change this to a doughnut graph • We found that it would be easier to read. Similar to the ECIF/CKS Analysis.
  • 8. VULNERABILITY COUNT BY AREA • Recommendation: • Changing the order to ascending order instead of alphabetical.
  • 11. RECOMMENDATIONS CONT. Do’s & Don’ts • Remove excess grid lines • Contrast • Readable labels • Avoid repetition • Avoid Smoothing and 3-D • Gradients • Sorting • Color Things to bring variety • Orientation • Curve • Length • Width • Shape • Enclosed • Intensity • Special • Motion
  • 12. OBJECTIVE: OUTPUT • Sourcefire automation was to reduce the amount of work it takes to extract the list of Sourcefire rule ID’s applied to each Policy in Defense center.
  • 13. SOURCEFIRE AUTOMATION • Task: Getting rule IDs applied to each policy in Defense Center • Method: Researched Sourcefire API • Results: We are currently unable to automate some of the correlations we want to. Now, Cisco will now be implementing some of our feature requests in SourceFire 6.2.
  • 14. OBJECTIVE: OUTPUT CONT. • Create a template for a final report of Cyber Defense Framework (results of the deliverables…graphs, pics, etc.), mimic A&P reports, export Tableau visualizations into template
  • 15. PROCESS FLOW TEMPLATE A Template containing the various steps involved in the CDC Framework based on a combination of both sample process flows and A&P reporting to create an organized streamlined view of CDC process flows. 15
  • 16. OVERALL EXPERIENCE RECOMMENDATION/IMPROVEME NT • More organization on objectives and deliverables (defined scope) • More specific objectives • Regular communication (weekly) TAKEAWAYS • Visualization • Group dynamic • Communication/networking • Insight into the CDC

Editor's Notes

  • #7: Easier to differentiate colors, size and importance (tiers closer to middle can may be more important than those farther out.)
  • #12: Hue ( no extreme colors) Page 109 from Data Fluency shows a great diverging gradient
  • #18: Eli-